Compact and Resilient Cryptographic Tools for Digital Forensics

被引:0
作者
Seyitoglu, Efe U. A. [1 ]
Yavuz, Attila A. [1 ]
Ozmen, Muslum Ozgur [1 ,2 ]
机构
[1] Univ S Florida, Tampa, FL 33620 USA
[2] Purdue Univ, W Lafayette, IN 47907 USA
来源
2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2020年
关键词
Authentication; digital signatures; digital forensics; audit logs; forward-security; aggregation; SECURE; SIGNATURES;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Audit logs play a crucial role in the security of computer systems and are targeted by the attackers due to their forensic value. Digital signatures are essential tools to ensure the authentication/integrity of logs with public verifiability and non-repudiation. Especially, forward-secure and aggregate signatures (FAS) offer compromise-resiliency and append-only features such that an active attacker compromising a computer cannot tamper or selectively delete the logs collected before the breach. Despite their high-security, existing FAS schemes can only sign a small pre-defined number (K) of logs, and their key-size/computation overhead grows linearly with K. These limitations prevent a practical adoption of FAS schemes for digital forensics. In this paper, we created new signatures named COmpact and REsilient (CORE) schemes, which are (to the best of our knowledge) the first FAS that can sign (practically) unbounded number of messages with only a sub-linear growth in the key-size/computation overhead. Central to CORE is the creation of a novel K-time signature COREBaseK that has a small-constant key generation overhead and public key size. We then develop CORE-MMM that harnesses COREBaseK via forward-secure transformations. We showed that CORE-MMM significantly outperforms its alternatives for essential metrics. For instance, CORE-MMM provides more than two and one magnitudes faster key updates and smaller signatures, respectively, with smaller private keys. CORE-MMM also offers extra efficiency when the same messages are signed with evolving keys. We formally prove that CORE schemes are secure. Our analysis indicates that CORE schemes are ideal tools to enhance the trustworthiness of digital forensic applications.
引用
收藏
页数:9
相关论文
共 27 条
  • [1] Abdalla M, 2000, LECT NOTES COMPUT SC, V1976, P116
  • [2] [Anonymous], 1999, ACM T INFORM SYSTEM, DOI DOI 10.1145/317087.317089
  • [3] Aumasson J.-P., 2010, Submission to NIST (Round 3)
  • [4] Babun L., 2018, ABS180900745 CORR
  • [5] Bellare M., 1993, P 1 ACM C COMP COMM, P62
  • [6] Bellare M., 2005, Ucsd Cse, V207, P207
  • [7] Boneh Dan, 2018, Advances in Cryptology - ASIACRYPT 2018. 24th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings: Lecture Notes in Computer Science (LNCS 11273), P435, DOI 10.1007/978-3-030-03329-3_15
  • [8] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [9] Attacks on Secure Logging Schemes
    Hartung, Gunnar
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 268 - 284
  • [10] Secure Audit Logs with Verifiable Excerpts
    Hartung, Gunnar
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 183 - 199